Long-term evolution network architecture

R Nossenson - 2009 IEEE International Conference on …, 2009 - ieeexplore.ieee.org
This paper provides a technological overview of the system architecture evolution (SAE) of
LTE networks. The target of this overview is to provide a basic knowledge on 4G cellular …

Quality of protection analysis and performance modeling in IP multimedia subsystem

C Lin, K Wang, L Lei, C Liu - Computer Communications, 2009 - Elsevier
IP Multimedia Subsystem (IMS) is widely considered as the main solution for the next
generation multimedia rich communication. In order to provide multi-level security service in …

Syntax, and semantics‐based signature database for hybrid intrusion detection systems

BIA Barry, HA Chan - Security and Communication Networks, 2009 - Wiley Online Library
Signature‐based intrusion detection systems (IDSs) have the advantages of producing a
lower false alarm rate and using less system resources compared to anomaly based …

A chain reaction DoS attack on 3G networks: Analysis and defenses

BY Zhao, C Chi, W Gao, S Zhu, G Cao - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
The IP multimedia subsystem (IMS) is being deployed in the third generation (3G) networks
since it supports many kinds of multimedia services. However, the security of IMS networks …

A context-aware security framework for next generation mobile networks

M Bandinelli, F Paganelli, G Vannuccini… - … 2009, Turin, Italy, June 3-5 …, 2009 - Springer
The openness and heterogeneity of next generation communication networks are now
highlighting more security issues than those of traditional communication environments …

SIP-empowered optical networks for future IT services and applications

F Callegati, A Campi, G Corazza… - IEEE …, 2009 - ieeexplore.ieee.org
This article presents a novel application-aware network architecture for evolving and
emerging IT services and applications. It proposes to enrich an optical burst switching …

Flexible single sign-on for SIP: bridging the identity chasm

P Nie, JM Tapio, S Tarkoma… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Identity federation is a key requirement for today's distributed services. This technology
allows managed sharing of users' identity information between identity providers (IDP), and …

Securing IMS against novel threats

S Wahl, K Rieck, P Laskov… - Bell Labs Technical …, 2009 - ieeexplore.ieee.org
Fixed mobile convergence (FMC) based on the 3GPP IP Multimedia Subsystem (IMS) is
considered one of the most important communication technologies of this decade. Yet this …

Tools for static code analysis: A survey

P Hellström - 2009 - diva-portal.org
This thesis has investigated what different tools for static code analysis, with an emphasis on
security, there exist and which of these that possibly could be used in a project at Ericsson …

Convergence of telephony and television: More than a computer on your TV

R Gaglianello, L Spergel, D Liu - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
The ongoing convergence of Telephony with Television, specifically cable TV and/or IPTV
opens possibilities for rich social interactions between groups of people. In this paper we will …